2014
DOI: 10.3390/s140202795
|View full text |Cite
|
Sign up to set email alerts
|

Availability Issues in Wireless Visual Sensor Networks

Abstract: Wireless visual sensor networks have been considered for a large set of monitoring applications related with surveillance, tracking and multipurpose visual monitoring. When sensors are deployed over a monitored field, permanent faults may happen during the network lifetime, reducing the monitoring quality or rendering parts or the entire network unavailable. In a different way from scalar sensor networks, camera-enabled sensors collect information following a directional sensing model, which changes the notion… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
49
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
7
2
1

Relationship

2
8

Authors

Journals

citations
Cited by 46 publications
(49 citation statements)
references
References 64 publications
0
49
0
Order By: Relevance
“…However, Named Data Networking (NDN) is one of the candidates for naming infrastructure in the future Internet [145]. [3], [15], [16], [17], [18], [134], [141], [146], [147] Availability - [124], [125] , [131], [148], [149] Reliability RERUM, RELYonIT [124], [126], [128], [148], [150], [151], [152] …”
Section: Remarksmentioning
confidence: 99%
“…However, Named Data Networking (NDN) is one of the candidates for naming infrastructure in the future Internet [145]. [3], [15], [16], [17], [18], [134], [141], [146], [147] Availability - [124], [125] , [131], [148], [149] Reliability RERUM, RELYonIT [124], [126], [128], [148], [150], [151], [152] …”
Section: Remarksmentioning
confidence: 99%
“…As there are significant differences between the type of sensed and transmitted data, cryptography may be optimized to achieve higher performance according to the media type. In fact, WMSNs may sense and transmit images, video, audio and scalar data, following a query-based, a time-based or an event-based paradigm [41]. Moreover, real-time transmissions may be required, also adding complexity to multimedia cryptography.…”
Section: Multimedia Data Encryptionmentioning
confidence: 99%
“…In this way, the recovery process is completed by cascading, that is, backup B of A is moved to position of A and newly backup of B is moved to position of B (lines [34][35][36][37][38][39]. If backup node B is critical and its backup is other than its primary, then it notifies to its backup and moves to position of its primary by cascading (lines [40][41][42][43] [34][35][36][37][38][39]. If the backup is critical and its backup is other than its primary, then the recovery procedure takes time NK (lines [40][41][42][43].…”
Section: Proposed Algorithmmentioning
confidence: 99%